1,264 research outputs found
Virtual reality application for rehabilitation
Aquest projecte té com a objectiu desenvolupar una aplicació de Realitat Virtual funcional per a la
rehabilitació i el benestar de la gent gran en residències d’avis. El que es pretén és complementar el
tractament de rehabilitació dels pacients mitjançant jocs de Realitat Virtual que els permetin realitzar
moviments repetitius mentre es mouen per un entorn natural immersiu.Este proyecto tiene como objetivo desarrollar una aplicación de Realidad Virtual funcional para la
rehabilitación y el bienestar de las personas mayores en residencias de ancianos. Lo que se pretende
es complementar el tratamiento de rehabilitación de los pacientes mediante juegos de Realidad Virtual
que les permitan realizar movimientos repetitivos mientras se mueven por un entorno natural
inmersivo.This project aims to develop a functional Virtual Reality application for the rehabilitation and well-being
of older adults in nursing homes. It intends to engage the patient in the rehabilitation treatment by
means of Virtual Reality games. To play these games, the patient must execute repetitive movements
while moving around in an immersive natural environment.Objectius de Desenvolupament Sostenible::3 - Salut i Benesta
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial
render instructional content in a three-dimensional immersive computer
experience for training youth with learning impediments. There are limited
prior works that explored attack vulnerability in VR technology, and hence
there is a need for systematic frameworks to quantify risks corresponding to
security, privacy, and safety (SPS) threats. The SPS threats can adversely
impact the educational user experience and hinder delivery of VRLE content. In
this paper, we propose a novel risk assessment framework that utilizes attack
trees to calculate a risk score for varied VRLE threats with rate and duration
of threats as inputs. We compare the impact of a well-constructed attack tree
with an adhoc attack tree to study the trade-offs between overheads in managing
attack trees, and the cost of risk mitigation when vulnerabilities are
identified. We use a vSocial VRLE testbed in a case study to showcase the
effectiveness of our framework and demonstrate how a suitable attack tree
formalism can result in a more safer, privacy-preserving and secure VRLE
system.Comment: Tp appear in the CCNC 2019 Conferenc
- …